Get my own profile
Public access
View all3 articles
2 articles
available
not available
Based on funding mandates
Co-authors
Prof Shui YuFIEEE, BoG of IEEE ComSoc , School of Computer Science, University of Technology SydneyVerified email at uts.edu.au
Keshav SoodSenior Lecturer in Cyber Security, SMIEEE, Deakin UniversityVerified email at deakin.edu.au
Robin DossDeakin Cyber Research & Innovation Centre (Deakin Cyber), Deakin UniversityVerified email at deakin.edu.au
Youyang QuResearch Scientist, Data61, CSIRO, Adjunct Assoc. Prof. @SwinburneVerified email at csiro.au
Marthie GroblerPrincipal Research Scientist, CSIRO's Data61Verified email at data61.csiro.au
Lei CuiDeakin University, School of ITVerified email at deakin.edu.au
Yong XiangSchool of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Syed W. ShahUNSW, Sydney/ Deakin UniversityVerified email at deakin.edu.au
Lei PanAssociate Professor, School of Information Technology, Deakin UniversityVerified email at deakin.edu.au
Dr. Neeraj Kumar, SMIEEETIET IndiaVerified email at thapar.edu
Dr. Ashish NandaDeakin UniversityVerified email at deakin.edu.au
Jongkil Jay JeongSenior Research Fellow, University of MelbourneVerified email at unimelb.edu.au
Zubair BaigAssociate Professor, Cyber-Security, Deakin University, Melbourne, AustraliaVerified email at deakin.edu.au
Follow
Mohammad Reza Nosouhi
Research Fellow at the School of Information Technology, Deakin University
Verified email at deakin.edu.au